Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

84results about How to "Protect users" patented technology

Packaged medical device with a deployable dermal tissue penetration member

A packaged medical device includes upper and lower flexible sheets, a lance body and a test strip. The lance body includes upper and lower surfaces, an opening that extends between the upper and lower surfaces and a dermal tissue penetration member that projects into the lance body opening. The test strip has an opening therethrough and is attached to the lance body lower surface such that the dermal tissue penetration member is operatively aligned with the test strip opening. The upper flexible sheet is attached to the lance body upper surface and covers the lance body opening, while the lower flexible sheet is detachably attached to the test strip and covers the test strip opening. The upper flexible sheet, lance body and test strip are configured such that, when the lower flexible sheet has been detached to uncover the test strip opening, the upper flexible sheet, lance body and test strip can be bent to deploy the dermal tissue penetration member from the lance body opening. A kit includes the packaged medical device described above and a deployment device for detaching the lower flexible sheet and bending the upper flexible sheet, lance body and test strip to deploy the dermal tissue penetration member. A method for deploying a dermal tissue penetration member of a packed medical device includes providing the packaged medical device described above, detaching the lower flexible sheet to uncover the test strip opening and bending the upper flexible sheet, lance body and test strip to deploy the dermal tissue penetration member.
Owner:LIFESCAN IP HLDG LLC

Packaged medical device with a deployable dermal tissue penetration member

A packaged medical device includes upper and lower flexible sheets, a lance body and a test strip. The lance body includes upper and lower surfaces, an opening that extends between the upper and lower surfaces and a dermal tissue penetration member that projects into the lance body opening. The test strip has an opening therethrough and is attached to the lance body lower surface such that the dermal tissue penetration member is operatively aligned with the test strip opening. The upper flexible sheet is attached to the lance body upper surface and covers the lance body opening, while the lower flexible sheet is detachably attached to the test strip and covers the test strip opening. The upper flexible sheet, lance body and test strip are configured such that, when the lower flexible sheet has been detached to uncover the test strip opening, the upper flexible sheet, lance body and test strip can be bent to deploy the dermal tissue penetration member from the lance body opening. A kit includes the packaged medical device described above and a deployment device for detaching the lower flexible sheet and bending the upper flexible sheet, lance body and test strip to deploy the dermal tissue penetration member. A method for deploying a dermal tissue penetration member of a packed medical device includes providing the packaged medical device described above, detaching the lower flexible sheet to uncover the test strip opening and bending the upper flexible sheet, lance body and test strip to deploy the dermal tissue penetration member.
Owner:LIFESCAN IP HLDG LLC

Method For The Authentication Of Applications

A method is disclosed for the authentication of applications both at the time of their downloading, as well as at the time of their execution. At least one application works in an equipment connected by a network to a control server, the equipment being locally connected to a security module. The application is loaded and/or executed via an application execution environment of the equipment and uses resources stored in the security module. The authentication method includes reception by the control server, via the network, of data including at least the identifier of the equipment and the identifier of the security module, analysis and verification by the control server of the data; generation of a cryptogram including a digest of the application, data identifying the equipment and the security module and instructions intended for the module; transmission of the cryptogram, via the network and the equipment, to the security module; and verification of the application by comparing the digest extracted from the cryptogram received with a digest determined by the security module. Further, said method further comprising steps wherein, during the initialization and/or the activation of the application, the security module executes the instructions extracted from the cryptogram, to at least one of release and block the access to certain resources of the security module according to the result of the verification suited to this application carried out previously.
Owner:NAGRAVISION SA

Method For Managing The Security Of Applications With A Security Module

The aim of this invention is to propose a method to manage the security of the set composed by an equipment, a security module and applications in order to limit the risk related to the fact that a security module could be fraudulently used by applications executed on a type of equipment and/or of software version that does not entirely fulfill the established security criteria. This aim is reached by a method for managing the security of applications with a security module functioning in an equipment connected to a network, said network being managed by a control server of an operator, said applications using resources as data or functions stored in a security module locally connected to said equipment, comprising the following preliminary steps: reception of data comprising at least the type and software version of the equipment and the identity of the security module, via the network, by the control server, analysis and verification by the control server of said data, generation of a cryptogram from the result of the verification of said data, and transmission of said cryptogram, via the network and the equipment, to the security module, said method further comprises steps wherein the security module analyses the received cryptogram and activates, respectively deactivates the resources as data or functions used by at least one application installed in the equipment, said cryptogram comprising the instructions conditioning the functioning of the application according to criteria established by the supplier of said application and/or the operator and/or the user of the equipment.
Owner:NAGRAVISION SA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products